Microsoft Teams has become an integral part of business life, but it also represents a sure-fire malware opportunity for threat actors.

Teams can be used for videoconferencing, voice calls, file sharing, and numerous collaborative processes, so it’s no surprise that it’s become extremely popular. This growth has accelerated significantly since the pandemic, and with over 320 million daily active users of Teams, it’s clear to see why threat actors view it as such an attractive target. The latest attack of note to strike Teams has been carried out by the Black Basta malware, last seen on these pages targeting US businesses in 2022.

As many of our readers are regular users of Teams, we decided it would be beneficial to shed light on this attack to help you reinforce your defenses.

Black Basta Strikes Again

The attack starts when a threat actor launches an onslaught of junk emails into a victim’s inbox. Naturally, this is an irritating situation, so when an offer of help is received via a Microsoft Teams message, it sounds like a lifesaver. This ‘help’ involves downloading a remote management tool – such as TeamViewer or Quick Assist – in order for the mysterious helper to connect to the PC in question and investigate the problem.

However, granting access is a huge mistake as it gives them full control over the PC in question. Therefore, the threat actor is able to begin downloading malware onto the target PC which harvests data. Of particular interest to the malware are login credentials, VPN configuration files, and multi-factor authentication tokens. These powerful slices of data then allow remote access to the PC without a single security question being raised.

Researchers have found that malware such as DarkGate and Zbot is being utilized by the threat actors during the attack, and that they’re posing as members of the targeted organization’s IT team. It’s also been reported that the threat actors have, at least once, attempted to use a QR code to trick a user into giving up their login credentials.

Shield Yourself from Black Basta Attacks

Handing over even a single set of login credentials can have catastrophic consequences for your IT infrastructure. With a foothold in your defenses, a threat actor can quickly establish themselves within your system, stealing data, encrypting files, and damaging hardware. Therefore, you should be mindful of attacks such as Black Basta.

The best safety essentials to employ are:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


unnamedRemote software has been vital for conducting online meetings and sharing desktops for years, but one of the most popular, TeamViewer, keeps getting hacked.

TeamViewer has regularly been the go-to option when it comes to businesses communicating online with colleagues, customers and technical support teams. Naturally, the procedures behind using remote software require a high level of trust.

And that’s why it’s worrying that a program which already asks you to relinquish control is at risk of being hijacked itself. This is potentially very troubling for businesses, so I’m going to take a look at what’s happening with TeamViewer.

TeamViewer Hack

The first rumblings of a hack emerged at the start of June when a disturbingly high number of TeamViewer users found that their PayPal accounts had been accessed. This was achieved by hijacking the users’ web browsers and accessing webmail and PayPal where users where still signed in.

What’s particularly worrying here is that many users reported having high levels of security in place. Even two-factor authentication (a gold standard of security) was not enough to stop the hijack taking place. Some of the hackers’ targets were lucky enough to be at their PC when the attacks took place, so were able to disconnect or revoke privileges, but others were not so lucky.

TeamViewer has not been keen to accept any liability for the attack. In fact, they have pointed the blame at their users re-using their TeamViewer login credentials on other websites which have then been hacked. However, it remains curiously strange that TeamViewer’s website went down for three hours at the height of the attack.

TeamViewer have since released a statement which confirmed their website outage, but claimed this was down to a denial-of-service and not a security breach.

TeamViewer’s Response

ximg_574f98a4ce746.png.pagespeed.gp+jp+jw+pj+js+rj+rp+rw+ri+cp+md.ic.Q8u1TYoCvPDespite TeamViewer not wanting to take any responsibility, they have since released two new additions to their software to increase security:

  1. Trusted Devices – By activating Trusted Devices, users are given the ability to approve any new device which is trying to connect to a TeamViewer session.
  2. Data Integrity – This feature is particularly clever as it monitors for any unusual behavior within the TeamViewer session. And, if this is detected, TeamViewer will not allow the session to continue without users resetting the password.

These are certainly useful features, but given the precious nature of remote sharing software, many users are wondering why these were not in place already.

Login Credentials Theft

Although many TeamViewer customers are upset over the company’s reluctance to accept any responsibility, TeamViewer may have a point about the theft of login credentials.

Just recently, a hacker has been trying to sell a mammoth database of stolen login credentials totaling around 640 million passwords. This is a major security threat and highlights the importance of protecting your passwords.

The best advice I can give, regarding passwords, is to remember the following:

  • Don’t reuse passwords on different accounts
  • Do not write down or tell other people your password
  • Use two factor verification wherever possible

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More